This paper describes the prototype of a honeypot system used to
detect an attempt of intrusion into a production system by using fake credentials.
The idea is to start honeypot on demand when an attacker or intruder tries to access it.
Prototype was built with instructions on how to setup the whole system. The complete implementation
is described as well as performance results.
According to the test results, additional improvements and extensions were proposed.